Bridgewater highlighted the Unauthorized Accesses as he explained that Cyber

Bridgewater highlighted the unauthorized accesses as

  • No School
  • AA 1
  • 5

This preview shows page 3 - 5 out of 5 pages.

Bridgewater highlighted the Unauthorized Accesses as he explained that Cyber Security protects this the most. The advice given following was surely something I was oblivious to as he stated, “Never buy the first version of anything because of bugs; also, manual passwords aren’t effective anymore and you should utilize your finger print or face recognition.” This is just a few of the ways you can exercise your own form of cyber security. Along with investigating
Image of page 3

Subscribe to view the full document.

companies that use centralized servers, as Bridgewater frowns upon them due to the lack of safety; these are the companies’ people should shy away from. Towards the middle of the presentation, Bridgewater introduces a new topic of “Block Chain Technology”. He expresses it as another form of Cyber Security that is a record keeping system to record transactions in a more safe and transparent nature. The benefit of this “Block Chain” is that it’s Immutable, Public, Decentralized (Reflecting back on Bridgewater stating that Centralized Systems were unsafe), and Currently tamper proof. It also combats double spend features, such as for PayPal which he makes a point that small business owners should be aware of this threat; along with encrypting data and sufficient record storages. Bridgewater then reflects back on the “Dark Web” as he defines its main purpose as a black-market space giving the example of things such as organs being sold due to their high values. Stating that the easiest way to fall into the traps of the dark web in terms of hacking is by clicking on popups. It’s suggested that you ignore or avoid popups along with declining cookies when entering sites as he states, “You can still view the site, you may not be able to view everything on that site, but you it’s safer.” Also, still in relation to the dark web, avoiding using
Image of page 4
Image of page 5
  • Fall '19

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes